Dulal Kumbhakar1*, Kanchan Sanyal2 and Sunil Karforma3

1*Department of B.C.A., Vivekananda Mahavidyalaya, Hooghly, W. B., India

2Asst.Teacher, Computer Application, Bhadrapur M.N.K High School, Birbhum, W, B., India

3Department of Computer Science, The University of Burdwan, Bardhaman, West Bengal, India

*Corresponding Email:


Supply chain management (SCM) is the set of assigned elements required to manage, control and execute the flow of goods and services from raw materials to final products and also dissemination of finished products to a business’s customers in efficiently with more economical way possible. Nowadays, many logistic companies adopt IoT network in connecting various devices used as a part of SCM to achieve the better operational efficiency of the SCM working flows. Hence, the various security vulnerabilities may arise due to the week data security mechanisms at the time of sharing collected sensitive data by IoT devices among the different levels of SCM or at the event of storing this data to the cloud and big data centers. For the purpose of the data security, we have proposed a novel chaos based hybrid encryption technique through Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES) 256 bit Encryption algorithm in securing device authenticity as well as confidentiality of the services in IoT based SCM. In this work, firstly, Elliptic-curve Diffie-Hellman (ECDH) key exchange protocol is used to generate ECC key pair and then ECC secret key is XORed with the key generated by logistic map method to increase the randomness of the keys. After that ECC shared key is transformed into AES 256 bit secret key through MD5 hashing technique in encrypting the input files. Further, the execution time with throughput regarding encryption and description time is computed to measure the performance efficiency of the work. Again, entropy values of the encrypted files are also calculated to measure the security strength. Based on the experiment results, our proposed hybrid encryption technique through computation time with entropy measurement is more fast and secure compared to other existing techniques.

KEYWORDS: Elliptic curve cryptography, ECDH, logistic map, AES, throughput and entropy.